Blockchain: Building Better Business Models Securely (2 hours)This talk will explain blockchain technology, how it can do much more than cryptocurrencies like Bitcoin, and the basics of "smart contracts." We'll separate the hype from the fact, and look at the security implications of placing corporate information in an unalterable distributed ledger. Most importantly, we'll discuss how to identify business processes at your organization that can be improved or enabled by this technology (hint: if you just substitute blockchain for database, it's not a good fit).

How to Build Out a Network Rack (1 hour)Let's face it -- most data center racks look like the entrails of the blue spaghetti monster. But you don't have to be OCD to construct a work of art -- equidistant wires connecting perfectly from port to port -- known in the industry as "cable porn."

G Mark finally had a chance to build out a rack and gained a lot of tips and tricks on how to get it right the first time. It takes a surprising number of iterations to do so. And, yes, there are security implications -- an ability to identify a suspicious port in seconds, not minutes, and a rapid incident recovery if a device fails and essential services must be rewired quickly.

Layer 1 is the foundation of the network stack, and the only thing an executive will see or understand. Mistakes will look ugly for years, so learn how to get it right the first time.

Privilege Management (1 hour)It's nearly impossible to hack a system as a guest. Most breaches are accompanied by attackers elevating privileges where they can cause some real damage. This presentation will look at privileged users in general, Windows privilege management, Linux privilege management, and database privileges.

Networking Fundamentals (1 hour)A lot of the time we take for granted what happens "in the wire" without fully understanding the protocols and the nuances involved. This talk will explain the network stack and examine common network protocols at layers three and four, as well as application layer protocols such as HTTP. We'll go from "I sort of knew something about that" to "so THAT's how it really works."

Security Predictions for 2019 (1 hour)Every year we take a look at what new and emerging technologies have had an impact (and those that didn't) based on recommendations of multiple authors and "authorities." We'll continue this series by trying to anticipate the winners and losers of 2019, and setting up a scorecard for next year's talk in 2020.

Speaker: G. Mark Hardy is founder and President of National Security Corporation. (Bio is located under the "Speakers" tab)

Earn 7 CPEs toward your CISM, CISA, or other certification

Price: Members $225.00Non-Members $275.00Full-time Students $195.00(Member Prices are for all ISACA, ISSA, AGA, and CFE members)

Select "Register Now" below to register and obtain more information about topic(s) and speaker.​